{"version":"1.0","provider_name":"Computer Repair Blog","provider_url":"https:\/\/www.karlstechnology.com\/blog","author_name":"Kristin Willis","author_url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/","title":"2021 Cyberattack Developments - Computer Repair Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Bn8WHXiXbP\"><a href=\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/\">2021 Cyberattack Developments<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.karlstechnology.com\/blog\/2021-cyberattack-developments\/embed\/#?secret=Bn8WHXiXbP\" width=\"600\" height=\"338\" title=\"&#8220;2021 Cyberattack Developments&#8221; &#8212; Computer Repair Blog\" data-secret=\"Bn8WHXiXbP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2020\/07\/My-Post-4.jpg","thumbnail_width":1200,"thumbnail_height":628,"description":"Malware, Ransomware, and spyware are just a few examples of threats that are designed to infiltrate vulnerable software. As a result, hackers can steal personal information such as social security numbers or bank passwords. The Microsoft Digital Defense Report shared that while hackers are hitting hard, cybersecurity is hitting harder. As governments perceive cybercrime as [&hellip;]"}